Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)最新文献

筛选
英文 中文
Reuse-based Methodology in Developing System-on-Chip (SoC) 基于重用的片上系统开发方法
Soo-Ho Chang, Soo Dong Kim
{"title":"Reuse-based Methodology in Developing System-on-Chip (SoC)","authors":"Soo-Ho Chang, Soo Dong Kim","doi":"10.1109/SERA.2006.59","DOIUrl":"https://doi.org/10.1109/SERA.2006.59","url":null,"abstract":"System-on-chip (SoC) plays a key role in building various embedded systems. With the advance of SoC technology, the complexity of SoC is sharply increasing. In addition, there is a great industry demand on technologies for producing reusable SoC components. However, conventional SoC approaches focus largely on designing the lower-level details of SoC at hardware level without going through model-level engineering. They also do not address the reusability issues of SoC. In this paper, we propose a solution framework for producing reusable SoC in a cost-effective way by adopting model-level engineering such as domain analysis, variability analysis, and component design. We first identify the three dimensions of reusing SoC, and analyze eight different cases of reusing SoC. Then, we present software engineering techniques that can be effectively utilized in developing reusing SoC. Finally, we define a methodology for a most demanding case. The key contribution of our research lies on three folds; identifying dimensions and feasible cases of reusing SoC, identifying effective software engineering techniques for developing reusable SoC, and defining a reuse-focused methodology of SoC","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125272244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Comparison of Five Black-box Testing Methods for Object-Oriented Software 面向对象软件五种黑盒测试方法的比较
Kwang-Ik Seo, Eun-Man Choi
{"title":"Comparison of Five Black-box Testing Methods for Object-Oriented Software","authors":"Kwang-Ik Seo, Eun-Man Choi","doi":"10.1109/SERA.2006.22","DOIUrl":"https://doi.org/10.1109/SERA.2006.22","url":null,"abstract":"As the size of software is getting huge, it is difficult for testers to check out all parts of source code in white-box style during integration testing or system testing period. Therefore functional test methods based on requirements information are frequently used in system level test. There have been a lot of test methods based on requirement specification. Each method has a different approach to specify software requirements. Test engineer should consider those various aspects of approaches and select proper black-box testing method to be applied. This paper presents the empirical comparison of major black-box testing methods and shows the different results by applying them to test a certain software system. The result shows that black-box testing methods check different levels of code construct. Test planer should consider the combination for the efficient test methods which combine extended use case test method and OCL test method","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126958533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Studies on Project Management Models for Embedded Software Development Projects 嵌入式软件开发项目管理模型研究
Toyoshiro Nakashima, K. Iwata, Yoshiyuki Anan, N. Ishii
{"title":"Studies on Project Management Models for Embedded Software Development Projects","authors":"Toyoshiro Nakashima, K. Iwata, Yoshiyuki Anan, N. Ishii","doi":"10.1109/SERA.2006.64","DOIUrl":"https://doi.org/10.1109/SERA.2006.64","url":null,"abstract":"In a corporation or the division of a corporation where software is being developed, it is becoming very important to develop software efficiently while guaranteeing the quality, limiting the cost, and maintaining the development schedule. Therefore, the corporation and the division of the corporation that develop software are implementing various improvement methods, including process improvement. In this study we have analyzed data from a software development project and studied how to determine which software development project will fail because it takes more manpower that originally estimated. In addition, we have implemented project-management support tools by combining the project-monitoring and managing tools that are already in use. We have also developed a new model that uses the statistical method, by reviewing the tools that are already used to estimate manpower for new projects","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127023916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Active Intelligent Service Offer System Addition Environment variable and Local variable 主动智能服务提供系统增加环境变量和局部变量
Kyung-Sang Sung, H. Oh
{"title":"Active Intelligent Service Offer System Addition Environment variable and Local variable","authors":"Kyung-Sang Sung, H. Oh","doi":"10.1109/SERA.2006.9","DOIUrl":"https://doi.org/10.1109/SERA.2006.9","url":null,"abstract":"It has been highlighted and spread that the cutting edge system and intelligence home system raised from dramatic development of IT technology. Through the progressed application of home networking tech. and diverse multi-media, there are plenty of efforts to pursue the realization of human convenience. As a home networking services is on the increase, so is the demand for context-aware services, utilizing a profile of users as well as various context information, a sensor, and other environmental information in order to recognize a pattern of users' activities. And more enhanced services that can analyze users' pattern of behaviors and reflect individual tendency in the service should be offered so that users can obtain the information they want much faster. Thus, an intellectual control model is discussed, which can offer active service based on a pattern of users' behaviors, in order to suggest a device that predicts users' activities and operates in a more intelligent way","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114590048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying a Goal-Oriented Method for Hazard Analysis: A Case Study 应用目标导向方法进行危害分析:个案研究
Sam Supakkul, L. Chung
{"title":"Applying a Goal-Oriented Method for Hazard Analysis: A Case Study","authors":"Sam Supakkul, L. Chung","doi":"10.1109/SERA.2006.16","DOIUrl":"https://doi.org/10.1109/SERA.2006.16","url":null,"abstract":"Traceability between hazards and countermeasures is important for hazard analysis to give confidence and help justify whether relevant hazards have been considered and sufficiently mitigated. However, use case modeling, the current de facto standard technique for requirements elicitation lacks negative modeling constructs for representing hazards. This paper presents a case study to apply a goal-oriented method for car security related hazard analysis where hazards are represented as operationalizations with negative contribution toward system non-functional requirements (NFRs). In turn, countermeasures are represented as operationalizations with negative contribution toward the respective hazards to negate their negative effect on the NFRs. The study finds that using the goal-oriented approach is most suitable for risk-driven applications, but also compatible and complementary to other applications","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134381213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Hybrid Prediction Model for improving Reliability in Self-Healing System 提高自愈系统可靠性的混合预测模型
Giljong Yoo, Jeongmin Park, Eunseok Lee
{"title":"Hybrid Prediction Model for improving Reliability in Self-Healing System","authors":"Giljong Yoo, Jeongmin Park, Eunseok Lee","doi":"10.1109/SERA.2006.40","DOIUrl":"https://doi.org/10.1109/SERA.2006.40","url":null,"abstract":"In ubiquitous environments, which involve an even greater number of computing devices, with more informal modes of operation, this type of problem have rather serious consequences. In order to solve these problems when they arise, effective reliable systems are required. Also, system management is changing from a conventional central administration, to autonomic computing. However, most existing research focuses on healing after a problem has already occurred. In order to solve this problem, a prediction model is required to recognize operating environments and predict error occurrence. In this paper, a hybrid prediction model through four algorithms supporting self-healing in autonomic computing is proposed. This prediction model adopts a selective healing model, according to system situations for self-diagnosing and prediction of problems using four algorithms. In this paper, a hybrid prediction model is adopted to evaluate the proposed model in a self-healing system. In addition, prediction is compared with existing research and the effectiveness is demonstrated by experiment","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131615257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Efficient Load Balancing Method for Mobile Applicable iSCSI-based Remote Storage Service 移动应用iscsi远程存储业务的高效负载均衡方法
J. Kang, Wonil Choi, Myong-Soon Park
{"title":"Efficient Load Balancing Method for Mobile Applicable iSCSI-based Remote Storage Service","authors":"J. Kang, Wonil Choi, Myong-Soon Park","doi":"10.1109/SERA.2006.31","DOIUrl":"https://doi.org/10.1109/SERA.2006.31","url":null,"abstract":"Mobile appliances are getting used in many areas. The explosive growth of the mobile appliance markets and requests of a lot of demands in mobile-related services lead many researches to apply for wired network environment services to mobile appliances. However, there are too many restrictions like connection failures to apply service that requires large scales of multimedia data, or services that require block unit I/O like large scale database to mobile devices. Using fail-over channel for the error recovery without any consideration of load processing status in each connection leads inefficient usage in wireless networks then it makes the quality of whole remote storage service down. In this paper, we propose an efficient load balancing method for iSCSI-based remote storage system to efficiently distribute data to valid connections when the established connection is failed in large scale data transmission of mobile applicant which supports multi-connection","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130684815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Framework for Application-Independent Semantic Management for Ubiquitous Computing Environment 泛在计算环境下与应用无关的语义管理框架
Dongwon Jeong, Yixin Jing, Jinhyung Kim, D. Baik
{"title":"A Framework for Application-Independent Semantic Management for Ubiquitous Computing Environment","authors":"Dongwon Jeong, Yixin Jing, Jinhyung Kim, D. Baik","doi":"10.1109/SERA.2006.3","DOIUrl":"https://doi.org/10.1109/SERA.2006.3","url":null,"abstract":"This paper proposes a semantic management framework providing the ubiquitous application field-independent interoperability. The goal of the proposed framework is to provide a consistent and independent semantic usability to ubiquitous applications. The proposed framework uses the merits of the metadata registry that has been developed for exchanging and sharing between databases by ISO/IEC JTC 1/SC 32. The proposed framework allows application field free semantic management and enables the practical and ideal ubiquitous application development","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115910327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of a Rule-based Security Engine for XML Web Services 基于规则的XML Web服务安全引擎的设计与实现
Priyanka Vasudevan, Lan Yang
{"title":"Design and Implementation of a Rule-based Security Engine for XML Web Services","authors":"Priyanka Vasudevan, Lan Yang","doi":"10.1109/SERA.2006.25","DOIUrl":"https://doi.org/10.1109/SERA.2006.25","url":null,"abstract":"Web services are software systems that enable applications serving various functions through the Web. Extensible markup language (XML) is used in the integration of applications which makes data sharing and communication within applications easier and uniform. Security is an important aspect of Web services. Securing XML data is critical to the success of any Web based applications or Web services. In this research work we have designed and implemented a single-point rule-based security engine for Apache Axis. Apache Axis is an open source Web services development and deployment platform. By doing this we reuse the same security engine for more than one Web service so that applications need not to implement separate security logic. The security engine provides support for authentication, authorization, decryption and signature verification. A test application is also implemented to validate the design and implementation of the rule-based security engine","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122147592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
2D Direct LDA Algorithm for Face Recognition 二维直接LDA人脸识别算法
Dong-uk Cho, U. Chang, Bong-hyun Kim, Se Hwan Lee, Younglae Bae, Soo Cheol Ha
{"title":"2D Direct LDA Algorithm for Face Recognition","authors":"Dong-uk Cho, U. Chang, Bong-hyun Kim, Se Hwan Lee, Younglae Bae, Soo Cheol Ha","doi":"10.1109/SERA.2006.1","DOIUrl":"https://doi.org/10.1109/SERA.2006.1","url":null,"abstract":"A new low-dimensional feature representation technique is presented in this paper. Linear discriminant analysis is a popular feature extraction method. However, in the case of high dimensional data, the computational difficulty and the small sample size problem are often encountered. In order to solve these problems, we propose two dimensional direct LDA algorithm named 2D-DLDA, which directly extracts the image scatter matrix from 2D image and uses direct LDA algorithm for face recognition. The ORL face database is used to evaluate the performance of the proposed method. The experimental results indicate that the performance of the proposed method is superior to DLDA","PeriodicalId":187207,"journal":{"name":"Fourth International Conference on Software Engineering Research, Management and Applications (SERA'06)","volume":"65 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129702758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信